Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Trecherous Computing lol

Name: Anonymous 2005-12-14 10:12

I'm writing a debate on Trusted Computing, and after remembering a flash that's more than likely been bumped off of 4chan's /f/, I decided to ack world4ch about it. Anyone have links to good rants or articles on TC that would provide for some solid pros and cons about the issue? You guys could also throw in what you think about TC, as I can quote discussion groups.


mewtnote (lol): I was about to write this on Jackie T. and the Violence in Video Games baloney, but some professor who's much more important than me has already done it. (Very well, I might add.)

Name: Anonymous 2005-12-17 2:41

The idea is that no computer without it is able to communicate with a computer that has it

Authoritative link on this? I think you've misunderstood what remote attestation does.

to inform the users who handle computers daily, and incorporate SOME software security solutions

All true, but ignores that TC is another layer of defence. At some point additional security is counter-productive, but I believe TC is a far more effective and transparent means of keeping the users from harming the network than, say, telling them everyday that viruses are bad, or worrying some dickhead is going to truck in an infected laptop on some part of the network.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List